Feeds

IBM tears up open source patent pledge, claims FOSS

Turbo-charged accusations fly

Internet Security Threat Report 2014

IBM snubbed a request from the British founder of TurboHercules SAS to let it offer a disaster recovery product for IBM mainframe users and instead accused the French open source startup of violating its intellectual property.

According to a letter published today by NosoftwarePatents founder Florian Mueller, Big Blue has abandoned its commitment to the open source community by attacking the Hercules project, which was founded by Roger Bowler more than a decade ago.

The mainframe emulator code was written to enable users to run IBM's z/OS on x64 or Itanium iron instead of System z hardware from Big Blue.

"A reliable source close to the Hercules project has provided me with this letter that Mark Anzani, IBM's mainframe CTO, recently sent to TurboHercules SAS," wrote Mueller.

"The letter comes with a 'non-exhaustive' list including 106 IBM patents plus 67 pending patent applications."

He claimed that the list includes two of the US patents (5613086 and 5220669) which were among the 500 patents IBM pledged not to use against the open source community.

"This is so appalling that I felt compelled to show to the FOSS community what IBM is doing: IBM is using patent warfare in order to protect its highly lucrative mainframe monopoly against Free and Open Source Software."

Mueller is demanding regulatory action against IBM, which already faces an anti-trust probe after TurboHercules filed a complaint with the European Commission last month.

"In an area in which IBM generates massive revenues (an estimated $25bn annually just on mainframe software sales!), any weapon will be brought into position against open source," griped Mueller.

"Even patents, which represent to open source what nuclear arms are in the physical world."

We asked Big Blue to comment on this story, but at time of writing it hadn't gotten back to us. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.